Network-Wide Change Management Visibility with Route Analytics
|
|
- Gyles Nicholas Evans
- 7 years ago
- Views:
Transcription
1 Network-Wide Change Management Visibility with Route Analytics
2 Executive Summary Change management is a hot topic, and rightly so. Studies routinely report that a significant percentage of application and service delivery problems in IP networks are caused by misconfigurations and other human errors -- usually made during routine changes to the network. Yet while a variety of change management solutions are available, they are all concerned with controlling changes from a device-centric point of view whether or not command syntax is being typed in correctly, or whether the authorized version of operating system (OS) or drivers is being applied. While extremely useful, these solutions still lack a major component: the visibility to help IT departments working with large or complex networks to easily understand precisely how the entire network including routing and traffic flows will behave when changes are made. Given that delivering applications with high availability and performance is the network's purpose, the uncertainty involved in such routine network operations creates a significant gap in IT s ability to meet its service level commitments. The root of this uncertainty is primarily technological: The lack of network management tools that can maintain an accurate model of the as-running network s routing and traffic behavior as the basis for network engineering and operations. Without this fundamental knowledge, network managers are frequently operating in the dark, making decisions based on inaccurate or missing information. Route analytics technology bridges this gap in network management intelligence, providing IT with an always-accurate model of the as-running network's routing and traffic. Using this automatically self-maintaining model, network managers can "rewind" recorded network history to examine exactly how routing and traffic behaved at any point in the past. And they can perform highly accurate change modeling to simulate how the network would behave in the event of a future network change planned or unplanned. This white paper reviews the limitations to traditional change management tools and strategies, explains how route analytics works and how it can be used simulate and plan not only simple, routine maintenance change operations, but also complex network changes such as a data center migration in a large, complex enterprise network. IT departments stand to gain vastly increased visibility that increases the accuracy of change operations and reduces errors, resulting in higher and more predictable application availability and performance. Ultimately, they can also realize improved utilization of existing network assets and reduced operational costs. Why Device-Centric Change Management is Insufficient The fundamental limitation of change management tools today is that, while they provide helpful process control for executing device commands correctly and enforcing version controls across multiple devices, they offer no insight as to whether a configuration on a particular device will have its intended effect across the network. In large, complex and redundant networks which usually are controlled by routing protocols such as OSPF, IS-IS, EIGRP and BGP this is critical, because the countless variations in routing behavior make the implications of a routing or traffic change very difficult to understand. As any experienced network engineer will attest, it is hardly uncommon for unforeseen consequences to result from a change. Even changes that are well managed from a device point of view can and will regularly exert an unintended butterfly effect on some other part of the network Packet Design, Inc. Page 2 of 18
3 Artificial Solutions Don t Cut It Of course, this is nothing new. That s why IT and network engineering organizations sometimes shell out the capital and software costs to either build a lab to test network changes before they re rolled out, or to buy network modeling software. While there are merits to both of these measures, both of them work on artificial, offline models which can't provide accurate, networkwide visibility into the impact of planned or unplanned changes. Labs are by definition artificial and can't come near approximating the complexity of the production network, so they are primarily useful for testing device behavior such as interoperability or performance. Network modeling software is a good deal better in that, with a lot of work, an engineer can create a model that looks much like the actual network. But it s still a manually created model that can t tell how routing and traffic would actually behave, and updating it takes so much time and effort that it's impractical for day-to-day and week-to-week change operations. Network modeling solutions can also be extremely expensive. At the end of the day, traditional network modeling solutions are mostly useful for long-range, major planning exercises. Route Analytics Seeing the Network like a Router Now there is an answer to the need for network-wide network change modeling and visibility. Route analytics is a technology that leverages the intelligence in routing protocols to automatically build and maintain an always-accurate routing map of any IP network, across AS, areas, and multiple protocols. Route analytics solutions peer with key routers in each AS or area, passively listening to and recording every routing update communicated throughout the network. Route analytics implements the same algorithms that run on routers to calculate and deliver a routing topology map as accurate as the network s actual routers understand it. Based on this routing map, route analytics then intelligently integrates NetFlow data collected from a small subset of network interfaces to create an integrated, dynamically updated routing and traffic map. This integrated view is distinct from traditional methods of NetFlow analysis, which do no more than present link-by-link flow data in separate tabular reports. Route analytics collects NetFlow records from routers handling the majority of traffic flows into a network, such as at data centers, Internet peerings and key WAN links. It then utilizes its always accurate knowledge of routing paths to map each traffic flow across the precise links it traverses in the actual network. The result is a network-wide map of all links with accurate real-time and historical traffic utilization and flow details. This map can be rewound to past moments in time to perform forensic analysis on the exact state of traffic and routing at that time; it can also be used as the basis for simulating routing and traffic changes, showing exactly how the whole network would behave in response. Route analytics delivers this comprehensive intelligence with a minimum of overhead, since it collects NetFlow records from only a few exporting routers. Route Analytics in a Simple Change Management Scenario: Adding a New IGP Route or Routes Route analytics empowers IT with visibility to make even mundane network changes and updates far more accurate. In this example, route analytics is applied to enhance best practices for the relatively simple operation of adding new routes to a router. When adding new IGP routes, the following best practice steps are recommended: 2013 Packet Design, Inc. Page 3 of 18
4 Pre-Implementation Work 1. Assign the prefix to the project 2. Determine the date for application to the network 3. Verify that the prefix does not exist in the routed infrastructure (unless the new route is a backup route) 4. If it is a backup route, then confirm if it is a primary, secondary, or equal cost path 5. Assign the correct metric to route if different from default 6. Determine if the summary block assigned is summarized for the area or region 7. Determine if the summary block needs a summary statement and where it is needed 8. Note which routers will be affected by the route addition 9. Confirm that no other maintenance is needed on this router in conjunction with this addition (e.g., upgrade to new version of code, addition of hardware for this interface or other future additions) Installation Plan Definition 1. Verify that the correct router is being changed 2. Re-check that the prefix has not been used in the routed infrastructure 3. Add the prefix as primary or secondary to interface or add static 4. Add the network statement to the IGP process 5. Confirm that the prefix is active and in the correct format (i.e., prefix and mask are correct) Back-Out Plan Definition 1. If the prefix exists on another router, either attempt to get another prefix assigned and replace the current prefix with the new prefix, or abort the maintenance until a suitable prefix can be assigned. 2. If the prefix will not come up in IGP, then assure that all the maintenance steps have been completed. Look at routing tables for advertisements. Remove the new interface configuration, or document the change and shut the interface down. Remove static routes if applicable. Approval Process 1. Obtain approval through the local process for the maintenance with the above plan specifications Perform Maintenance 1. Notify the Network Operations Center (if applicable) that maintenance is beginning 2. Work through the maintenance procedure to conclusion 3. Test all new prefixes to confirm that they are advertised correctly a. If not, then troubleshoot b. If it cannot be fixed, back out 4. If everything checks out correctly, then close the maintenance with NOC 2013 Packet Design, Inc. Page 4 of 18
5 How Route Analytics Helps in Adding IGP Routes Route analytics has full knowledge of all routed prefixes, metrics and netmasks, and provides a network-wide prefix list (see Figure 1) that shows all routes that are active in the network; this provides 100% assurance that the prefix and mask do not already exist in the infrastructure. Figure1: Network-wide prefix list aids in ensuring that a proposed added route doesn t already exist somewhere in the network. Using the same prefix view, network engineers can also confirm the summary block that holds this prefix and the source from which it is advertised. This will ensure the summary will be advertised correctly. Before the maintenance, network engineers can view relevant routing event streams by router and/or area, to confirm that the router and region to be changed are not experiencing significant churn. For example, they can look at a particular router (Figure 2) to launch the events list (Figure 3) and view the level of activity on the router. If there is a high level of churn, the engineer can work with the responsible person on call to return the router and region to a more stable state. This step is important because starting maintenance while other problems are occurring in a region can impact diagnostic efforts for another engineer who might be working in the region. (It also prevents the change operation from becoming the unwitting scapegoat for problems that were already occurring pre-maintenance.) 2013 Packet Design, Inc. Page 5 of 18
6 Figure 2: Route analytics visualizes the entire network topology, showing the actual state of routing at any point in recorded time, and offers full interactivity including the ability to drill down by choosing a router and seeing its prefixes, events, and neighbors Packet Design, Inc. Page 6 of 18
7 Figure 3: Events view for an individual router, over a specified period of time. When the route is added to the protocol on the router, the same events view can be used to verify that the router has propagated the change. In addition, route analytics can be used to increase the accuracy of the change operation by executing the following steps: Examine prefix lists from within the area or level, and from outside, to see if the summary is working correctly. Verify from which router the route originated, where it is summarized, what netmask and metric are associated with it, and how traffic from other parts of the network will use the route to move data across the network. If the route is not behaving as desired, route analytics can be used to model metric changes to route traffic correctly. The network engineer highlights a routed path across the network in the topology view, then clicks on the relevant link, adjusts the metric, and finally observes how the path changes. Figure 4 shows an example of highlighting a path and changing a metric in an EIGRP network Packet Design, Inc. Page 7 of 18
8 Figure 4: Metric changes can be modeled with route analytics by selecting a path (highlighted in yellow above) and simulating new metrics. Once the metrics are changed, route analytics displays precisely how the routed path will change as a result. Route Analytics Applied to Data Center Migration Route analytics can also be used for more significant network operations such as simulating the effects of a planned migration of servers from one data center to another. The network illustrated in this case study is that of a multi-national Fortune 500 enterprise running EIGRP. The key question was to determine what would happen to link utilization on core WAN circuits if servers were moved to a different data center. For the sake of scope, a particularly important circuit was chosen for focused analysis, as shown in Figure Packet Design, Inc. Page 8 of 18
9 What happens to link utilization of core WAN circuits if servers are moved from this location to this location? Route analytics can show the effect on all circuits, but this circuit will be used to illustrate in detail Figure 5: Route analytics helps engineers understand how WAN circuits would behave after a data center migration. Since route analytics records and stores a complete forensic history of all routing and traffic changes, network managers were able to "rewind to a point in time where there was a historically high level of WAN circuit utilization, and use this as the basis for the planning and simulation exercise. A histogram of traffic utilization across any selected link or any portion of the network in aggregate is seen in Figure Packet Design, Inc. Page 9 of 18
10 Route analytics lets users view the state of routing and traffic at any point in the recorded database In this case, the network manager moves back in time to a period of high utilization (to see worst case-scenario) Figure 6: Network managers found a past point of high utilization to use as the basis for their data center migration simulation exercise. Clicking on any link in the network map reveals rich details on routing and traffic state at that moment in time. In this case, network managers were able to see the precise utilization of the WAN link in question, in both directions, as seen in Figure Packet Design, Inc. Page 10 of 18
11 At the selected time period: Southbound traffic on this link is 37.72Mbps (it is experiencing high utilization, so half the link is red) Northbound traffic utilization is negligible, so the northbound half is grey (indicating low utilization) Figure 7: Route analytics network map provides rich details on routing and traffic for links, paths, and routers, such as WAN link utilization. Having selected a particular point in time, the network manager can simulate routing and traffic changes based on the state of the network at the time being viewed. The network manager selects the router in the data center that delivers the traffic from the servers that are to be moved, and displays a list of network addresses (or prefixes). Then he simulates the downing of the prefix representing the server cluster, as seen in Figure Packet Design, Inc. Page 11 of 18
12 For the data center router, the network manager displays the list of networks (prefixes) it supports... then simulates downing the prefix to be moved Figure 8: Route analytics allows network managers to view comprehensive information such as a list of all routed prefixes, which eases network change simulations such as downing a prefix. Next, the network manager opens the router in the data center to which the servers are being moved, and adds the downed prefix from the first data center to simulate the server cluster being brought up in that data center, as seen in Figure 9. Route analytics simulates the re-routing of all traffic destined for this prefix to the new network location. This simulation is completely accurate, since it is based on the precise state of routing and traffic at that moment in time Packet Design, Inc. Page 12 of 18
13 Traffic Explorer can simulate moving servers from the first data center to the second one by moving the prefixes, thus re-routing traffic to the new datacenter. Figure 9: Moving the server cluster is modeled by adding the previously downed prefix from the first data center to a router handling traffic at the new data center. Route analytics now displays a network map, as seen in Figure 10, which shows that utilization in the southbound direction on the WAN link has decreased slightly, while the northbound utilization has changed from negligible to high. This is important intelligence for the network engineering team, which can now perform further analyses to find a way to accommodate the proposed change without incurring new costs Packet Design, Inc. Page 13 of 18
14 After the modeled change: Southbound traffic on this link has DECREASED to 37.67Mbps from 37.72Mbps (it is still high utilization, so half the link is red). #2 For Northbound traffic, utilization is HIGH, so the Northbound half is RED. Figure 10: Route analytics shows precisely how the network would behave after a planned change. In this case, northbound link utilization for the WAN circuit in question would be too high, so further planning adjustments will be needed before this change is implemented. For the specific WAN link examined in this case, an unacceptable utilization level would occur as a result of this data center move, prompting the network managers to further analyze their options. Route analytics provides comprehensive link utilization analysis capabilities to ease analysis of the before-and-after effects of specific change scenarios Packet Design, Inc. Page 14 of 18
15 Network managers can examine how ALL of the links in the ENTIRE network have been affected by this move via Link Utilization, Link Traffic and Available Capacity Reports. Figure 11: Route analytics provides comprehensive link utilization information on a before-andafter simulated change basis Packet Design, Inc. Page 15 of 18
16 We can see available capacity across the ENTIRE network after simulating the data center move. Figure 12: Route analytics provides insight into network-wide available capacity for real-time monitoring as well as for historical analysis and modeling purposes. Using this intelligence and further network change modeling and simulation, the network managers may be able to find a way to adjust routing to accommodate the traffic without incurring additional WAN circuit costs (e.g., by modifying certain router metrics). Upon performing these simulations, they may further find, by looking at link traffic analyses and finding links with low utilization, that certain WAN links can be decommissioned or cost-reduced (see Figure 13) Packet Design, Inc. Page 16 of 18
17 This circuit bandwidth can now be reduced to save cost! Figure 13: Network managers can find ways to optimize use of existing network assets to contain or reduce costs by modeling changes and finding under-utilized or unutilized links. Benefits of Route Analytics to Change Management Processes Route analytics provides a number of benefits for IT change management operations: Increases accuracy of network planning and change operations Mitigates risk of impacting application performance due to unexpected behavior when executing planned changes Helps maximize existing network assets and contain or reduce WAN bandwidth costs Improves IT productivity by automating previously highly manual tasks such as maintaining an up-to-date network map 2013 Packet Design, Inc. Page 17 of 18
18 Conclusion As pressure increases on IT to deliver predictable application availability and performance, especially with the advent of more sensitive converged services such as VoIP, network managers need more than just device-centric approaches to ensure that change management operations are accurate on a network-wide basis. Route analytics provides the global network visibility needed to complement and strengthen existing change management tools and processes, ensuring that they are accurate and efficient. With network-wide visibility of traffic behavior, network managers can deliver higher service levels while maximizing IT assets. To learn more about Packet Design and its industry-leading route analytics solutions, please: us at info@packetdesign.com Visit Packet Design s web site at Call us at Corporate Headquarters Packet Design Inc Augustine Drive Santa Clara, CA Phone: Fax: Packet Design, Inc. Page 18 of 18
Network-Wide Capacity Planning with Route Analytics
with Route Analytics Executive Summary Capacity planning is an important business process in large IP networks for ensuring reliable application and service delivery. In the days of fixed circuits and
More informationBest Practices for Eliminating Risk from Routing Changes
Best Practices for Eliminating Risk from Routing Changes TECHNICAL BRIEF Table of Contents Introduction 3 Route Analytics Intelligence to Meet the Routing Management Challenge 3 Routing Management Best
More informationEnhancing Network Monitoring with Route Analytics
with Route Analytics Executive Summary IP networks are critical infrastructure, transporting application and service traffic that powers productivity and customer revenue. Yet most network operations departments
More informationIntroduction. The Inherent Unpredictability of IP Networks # $# #
Introduction " $ % & ' The Inherent Unpredictability of IP Networks A major reason that IP became the de facto worldwide standard for data communications networks is its automated resiliency based on intelligent
More informationNetwork-Wide Class of Service (CoS) Management with Route Analytics. Integrated Traffic and Routing Visibility for Effective CoS Delivery
Network-Wide Class of Service (CoS) Management with Route Analytics Integrated Traffic and Routing Visibility for Effective CoS Delivery E x e c u t i v e S u m m a r y Enterprise IT and service providers
More informationRoute-Flow Fusion : Integrated NetFlow and IP Route Analysis
Route-Flow Fusion : Integrated NetFlow and IP Route Analysis WHITE PAPER Table of Contents Introduction 3 Increasing Demands and Changing Dynamics in IP 3 Networks 3 The State of Network Management Practice
More informationReal-Time Traffic Engineering Management With Route Analytics
Real-Time Traffic Engineering Management With Route Analytics Executive Summary Increasing numbers of service providers and mobile operators are using RSVP-TE based traffic engineering to provide bandwidth
More informationRouting & Traffic Analysis for Converged Networks. Filling the Layer 3 Gap in VoIP Management
Routing & Traffic Analysis for Converged Networks Filling the Layer 3 Gap in VoIP Management Executive Summary Voice over Internet Protocol (VoIP) is transforming corporate and consumer communications
More informationMPLS WAN Explorer. Enterprise Network Management Visibility through the MPLS VPN Cloud
MPLS WAN Explorer Enterprise Network Management Visibility through the MPLS VPN Cloud Executive Summary Increasing numbers of enterprises are outsourcing their backbone WAN routing to MPLS VPN service
More informationUnderstanding and Optimizing BGP Peering Relationships with Advanced Route and Traffic Analytics
Understanding and Optimizing BGP Peering Relationships with Advanced Route and Traffic Analytics WHITE PAPER Table of Contents Introduction 3 Route-Flow Fusion 4 BGP Policy Visibility 5 Traffic Visibility
More informationRegaining MPLS VPN WAN Visibility with Route Analytics. Seeing through the MPLS VPN Cloud
Regaining MPLS VPN WAN Visibility with Route Analytics Seeing through the MPLS VPN Cloud Executive Summary Increasing numbers of enterprises are outsourcing their backbone WAN connectivity to MPLS VPN
More informationCourse Contents CCNP (CISco certified network professional)
Course Contents CCNP (CISco certified network professional) CCNP Route (642-902) EIGRP Chapter: EIGRP Overview and Neighbor Relationships EIGRP Neighborships Neighborship over WANs EIGRP Topology, Routes,
More informationAdministrative Distance
RIP is a distance vector routing protocol. It shares routing information through the local broadcast in every 30 seconds. In this tutorial we will explain RIP routing fundamentals with examples such as
More informationTraffic & Peering Analysis
Traffic & Peering Analysis or how I learned to stop worrying and love route hijacking Pete Crocker pete@packetdesign.com Agenda Alternate methods of traffic / peering analysis Traffic Matrices Pros & Cons
More informationIntroduction to Dynamic Routing Protocols
CHAPTER 3 Introduction to Dynamic Routing Protocols Objectives Upon completion of this chapter, you should be able to answer the following questions: Can you describe the role of dynamic routing protocols
More informationUnderstanding Route Redistribution & Filtering
Understanding Route Redistribution & Filtering When to Redistribute and Filter PAN-OS 5.0 Revision B 2013, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Route Redistribution......
More informationBGP Best Path Selection Algorithm
BGP Best Path Selection Algorithm Document ID: 13753 Contents Introduction Prerequisites Requirements Components Used Conventions Why Routers Ignore Paths How the Best Path Algorithm Works Example: BGP
More informationDisaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs
Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs As a head of the campus network department in the Deanship of Information Technology at King Abdulaziz University for more
More informationRouter and Routing Basics
Router and Routing Basics Malin Bornhager Halmstad University Session Number 2002, Svenska-CNAP Halmstad University 1 Routing Protocols and Concepts CCNA2 Routing and packet forwarding Static routing Dynamic
More informations@lm@n Juniper Exam JN0-343 Juniper Networks Certified Internet Specialist (JNCIS-ENT) Version: 10.1 [ Total Questions: 498 ]
s@lm@n Juniper Exam JN0-343 Juniper Networks Certified Internet Specialist (JNCIS-ENT) Version: 10.1 [ Total Questions: 498 ] Topic 1, Volume A Question No : 1 - (Topic 1) How much overhead does the GRE
More informationBest Practices for NetFlow/IPFIX Analysis and Reporting
WHITEPAPER Best Practices for NetFlow/IPFIX Analysis and Reporting IT managers and network administrators are constantly making decisions affecting critical business activity on the network. Management
More informationPacket Tracer 3 Lab VLSM 2 Solution
Packet Tracer 3 Lab VLSM 2 Solution Objective Create a simulated network topology using Packet Tracer Design an IP addressing scheme using a Class B subnetwork address and VLSM Apply IP addresses to the
More informationHigh Availability White Paper
High Availability White Paper This document provides an overview of high availability best practices for mission critical applications. Author: George Quinlan, Senior Consultant Background - High Availability
More information- Classful vs. Classless Routing -
lassful vs lassless outing v1.10 Aaron Balchunas 1 - lassful vs. lassless outing - lassful vs lassless routing protocols lassful routing protocols do not send subnet mask information with their routing
More informationManaging LTE IP Transport Networks with Route Analytics
Managing LTE IP Transport Networks with Route Analytics WHITE PAPER Table of Contents Executive Summary 3 LTE Core and Backhaul Transport Architectures 4 Why IP Networks Are Inherently Unpredictable 4
More informationNetwork Performance Management Solutions Architecture
Network Performance Management Solutions Architecture agility made possible Network Performance Management solutions from CA Technologies compliment your services to deliver easily implemented and maintained
More informationTesting Software Defined Network (SDN) For Data Center and Cloud VERYX TECHNOLOGIES
Testing Software Defined Network (SDN) For Data Center and Cloud VERYX TECHNOLOGIES Table of Contents Introduction... 1 SDN - An Overview... 2 SDN: Solution Layers and its Key Requirements to be validated...
More informationTECHNOLOGY WHITE PAPER. Correlating SDN overlays and the physical network with Nuage Networks Virtualized Services Assurance Platform
TECHNOLOGY WHITE PAPER Correlating SDN overlays and the physical network with Nuage Networks Virtualized Services Assurance Platform Abstract Enterprises are expanding their private clouds and extending
More informationwhitepaper Network Traffic Analysis Using Cisco NetFlow Taking the Guesswork Out of Network Performance Management
whitepaper Network Traffic Analysis Using Cisco NetFlow Taking the Guesswork Out of Network Performance Management Taking the Guesswork Out of Network Performance Management EXECUTIVE SUMMARY Many enterprise
More informationIntelligent Routing Platform White Paper
White Paper Table of Contents 1. Executive Summary...3 2. The Challenge of a Multi-Homed Environment...4 3. Network Congestion and Blackouts...4 4. Intelligent Routing Platform...5 4.1 How It Works...5
More informationRiverbed SteelCentral. Product Family Brochure
Riverbed SteelCentral Product Family Brochure Application performance from the perspective that matters most: Yours Applications are now the center of the business world. We rely on them to reach customers,
More informationSwitching Basics and Intermediate Routing CCNA 3 Labs and Study Guide Allan Johnson
Switching Basics and Intermediate Routing CCNA 3 Labs and Allan Johnson Introduction Switching Basics and Intermediate Routing CCNA 3 Labs and s is a supplement to your classroom and laboratory experience
More informationFlexible SDN Transport Networks With Optical Circuit Switching
Flexible SDN Transport Networks With Optical Circuit Switching Multi-Layer, Multi-Vendor, Multi-Domain SDN Transport Optimization SDN AT LIGHT SPEED TM 2015 CALIENT Technologies 1 INTRODUCTION The economic
More informationInternet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
More informationObjectives. Router as a Computer. Router components and their functions. Router components and their functions
2007 Cisco Systems, Inc. All rights reserved. Cisco Public Objectives Introduction to Routing and Packet Forwarding Routing Protocols and Concepts Chapter 1 Identify a router as a computer with an OS and
More informationModule 12 Multihoming to the Same ISP
Module 12 Multihoming to the Same ISP Objective: To investigate various methods for multihoming onto the same upstream s backbone Prerequisites: Module 11 and Multihoming Presentation The following will
More informationRiverbed SteelCentral. Product Family Brochure
Riverbed SteelCentral Product Family Brochure Application performance from the perspective that matters most: Yours Applications are now the center of the business world. We rely on them to reach customers,
More informationCisco IOS Flexible NetFlow Technology
Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application
More informationTraffic Analysis with Netflow The Key to Network Visibility
Traffic Analysis with Netflow The Key to Network Visibility > WHITEPAPER Executive Summary Enterprises today, know that the WAN is one of their most important assets. It needs to be up and running 24x7
More informationTransitioning to BGP. ISP Workshops. Last updated 24 April 2013
Transitioning to BGP ISP Workshops Last updated 24 April 2013 1 Scaling the network How to get out of carrying all prefixes in IGP 2 Why use BGP rather than IGP? p IGP has Limitations: n The more routing
More informationSDN IN WAN NETWORK PROGRAMMABILITY THROUGH CENTRALIZED PATH COMPUTATION. 1 st September 2014
SDN IN WAN NETWORK PROGRAMMABILITY THROUGH CENTRALIZED PATH COMPUTATION st September 04 Aaron Tong Senior Manager High IQ Networking Centre of Excellence JUNIPER S AUTOMATION HORIZON SDN IS A JOURNEY NOT
More informationRIVERBED STEELCENTRAL NETPLANNER
RIVERBED STEELCENTRAL NETPLANNER TESTIMONIALS IT Guru NetPlanner avoided the downtime of our critical applications by designing the network with resiliency to outages. Senior Network Architect Financial
More informationNetwork Level Multihoming and BGP Challenges
Network Level Multihoming and BGP Challenges Li Jia Helsinki University of Technology jili@cc.hut.fi Abstract Multihoming has been traditionally employed by enterprises and ISPs to improve network connectivity.
More informationAchieving Zero Downtime for Apps in SQL Environments
White Paper Achieving Zero Downtime for Apps in SQL Environments 2015 ScaleArc. All Rights Reserved. Introduction Whether unplanned or planned, downtime disrupts business continuity. The cost of downtime
More informationO 10.16.1.0/27 [110/129] via 192.168.1.5, 00:00:05, Serial0/0/1
1 Which two statements are true regarding the advantages of the use of static routes? (Choose increased security reduced effort in configuring routes the administrator maintains control over routing easier
More informationA Link Load Balancing Solution for Multi-Homed Networks
A Link Load Balancing Solution for Multi-Homed Networks Overview An increasing number of enterprises are using the Internet for delivering mission-critical content and applications. By maintaining only
More informationUnderstanding Route Aggregation in BGP
Understanding Route Aggregation in BGP Document ID: 5441 Contents Introduction Prerequisites Requirements Components Used Conventions Network Diagram Aggregate Without the as set Argument Aggregate with
More informationUsing LiveAction Software for Successful VoIP Deployments How to quickly and accurately deploy QoS for VoIP networks
LiveAction Application Note Using LiveAction Software for Successful VoIP Deployments How to quickly and accurately deploy QoS for VoIP networks September 2012 http://www.actionpacked.com Table of Contents
More informationChapter 4. Distance Vector Routing Protocols
Chapter 4 Distance Vector Routing Protocols CCNA2-1 Chapter 4 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor, Ontario.
More informationCisco Change Management: Best Practices White Paper
Table of Contents Change Management: Best Practices White Paper...1 Introduction...1 Critical Steps for Creating a Change Management Process...1 Planning for Change...1 Managing Change...1 High Level Process
More informationEnhancing BoD Services based on Virtual Network Topology Control
NTT Network Service Systems Laboratories Enhancing BoD Services based on Virtual Network Topology Control T. Miyamura E. Oki I. Inoue K. Shiomoto NTT Network Service Systems Labs. Today s BoD service application
More informationRoute Optimization. rek. 2005 Petr Grygarek, VSB-TU Ostrava, Routed and Switched Networks 1
Route Optimization (intra-as) Petr Grygárek rek 1 Goal of route optimization Static routing: More predictable and safer Dynamic routing: Automatically ally reacts on topology changes Lower administration
More informationA Case Study Design of Border Gateway Routing Protocol Using Simulation Technologies
A Case Study Design of Border Gateway Routing Protocol Using Simulation Technologies Chengcheng Li School of Information Technology University of Cincinnati Cincinnati, OH 45221 Chengcheng.li@uc.edu ABSTRACT
More informationTraffic Analysis With Netflow. The Key to Network Visibility
Summary Today, Enterprises know that the WAN is one of their most important assets. It needs to be up and running 24x7 for the enterprise to function smoothly. To make this possible, IT administrators
More informationExterior Gateway Protocols (BGP)
Exterior Gateway Protocols (BGP) Internet Structure Large ISP Large ISP Stub Dial-Up ISP Small ISP Stub Stub Stub Autonomous Systems (AS) Internet is not a single network! The Internet is a collection
More informationCisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time
Essential Curriculum Computer Networking II Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time Chapter 1 Networking in the Enterprise-------------------------------------------------
More informationRIVERBED STEELCENTRAL NETMAPPER
RIVERBED STEELCENTRAL NETMAPPER AUTOMATED NETWORK DOCUMENTATION NetMapper is the only solution that could address all our requirements. It automatically discovers and collects detailed network configuration
More informationIP Routing Configuring Static Routes
11 IP Routing Configuring Static Routes Contents Overview..................................................... 11-3 IP Addressing.............................................. 11-3 Networks.................................................
More informationThe Financial Benefits of Using LiveAction Software for Network QoS
White Paper The Financial Benefits of Using LiveAction Software for Network QoS How implementing network quality of service management can provide quantifiable cost savings, improved profitability and
More informationIMPLEMENTING CISCO MPLS V3.0 (MPLS)
IMPLEMENTING CISCO MPLS V3.0 (MPLS) COURSE OVERVIEW: Multiprotocol Label Switching integrates the performance and traffic-management capabilities of data link Layer 2 with the scalability and flexibility
More informationTE in action. Some problems that TE tries to solve. Concept of Traffic Engineering (TE)
1/28 2/28 TE in action S-38.3192 Verkkopalvelujen tuotanto S-38.3192 Network Service Provisioning Networking laboratory 3/28 4/28 Concept of Traffic Engineering (TE) Traffic Engineering (TE) (Traffic Management)
More informationIP Network Control: Turning an Art into a Science. Case Study: Global Crossing
Case Study: Global Crossing IP Network Control: Turning an Art into a Science Company: Industry: Global Crossing Holdings Ltd. Telecommunications Challenge(s): Global Crossing want the visibility and control
More informationOSPF Configuring Multi-Area OSPF
OSPF Configuring Multi-Area OSPF Objective In this lab configure a multiarea OSPF operation, interarea summarization, external route summarization, and default routing. Scenario International Travel Agency
More informationCisco and Visual Network Systems: Implement an End-to-End Application Performance Management Solution for Managed Services
Cisco and Visual Network Systems: Implement an End-to-End Application Performance Management Solution for Managed Services What You Will Learn In today s economy, IT departments are challenged to decide
More informationHow To Understand Bg
Table of Contents BGP Case Studies...1 BGP4 Case Studies Section 1...3 Contents...3 Introduction...3 How Does BGP Work?...3 ebgp and ibgp...3 Enabling BGP Routing...4 Forming BGP Neighbors...4 BGP and
More informationCA Spectrum r9.2.1. Overview. agility made possible
PRODUCT SHEET: CA Spectrum CA Spectrum r9.2.1 agility made possible The Service Assurance solution from CA Technologies helps enterprises, government agencies, and service providers assure their business
More informationGlobalSCAPE DMZ Gateway, v1. User Guide
GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical
More informationIMPLEMENTING CISCO IP ROUTING V2.0 (ROUTE)
IMPLEMENTING CISCO IP ROUTING V2.0 (ROUTE) COURSE OVERVIEW: Implementing Cisco IP Routing (ROUTE) v2.0 is an instructor-led five day training course developed to help students prepare for Cisco CCNP _
More informationWAN Traffic Management with PowerLink Pro100
Whitepaper WAN Traffic Management with PowerLink Pro100 Overview In today s Internet marketplace, optimizing online presence is crucial for business success. Wan/ISP link failover and traffic management
More informationAnalyze hop-by-hop path, devices, interfaces, and queues Locate and troubleshoot problems
Visualization, Management, and Control for Cisco IWAN Data sheet Overview Intelligent WAN is a Cisco solution that enables enterprises to realize significant cost savings by moving to less expensive transport
More informationQRadar Security Intelligence Platform Appliances
DATASHEET Total Security Intelligence An IBM Company QRadar Security Intelligence Platform Appliances QRadar Security Intelligence Platform appliances combine typically disparate network and security management
More informationSession Title: Exploring Packet Tracer v5.3 IP Telephony & CME. Scenario
Session Title: Exploring Packet Tracer v5.3 IP Telephony & CME Scenario With the scheduled release of Packet Tracer v5.3 in the near future, this case study is designed to provide you with an insight into
More informationProven techniques and best practices for managing infrastructure changes
Proven techniques and best practices for managing infrastructure changes When a business expands an existing facility, adds a new location, incorporates an influx of new users, or upgrades an existing
More informationConfiguring a Gateway of Last Resort Using IP Commands
Configuring a Gateway of Last Resort Using IP Commands Document ID: 16448 Contents Introduction Prerequisites Requirements Components Used Conventions ip default gateway ip default network Flag a Default
More informationLiveAction: GUI-Based Management and Visualization for Cisco Intelligent WAN
Solution Overview LiveAction: GUI-Based Management and Visualization for Cisco Intelligent WAN Overview Cisco Intelligent WAN (IWAN) enables enterprises to realize significant cost savings by moving to
More informationCisco CCNP 642 901 Optimizing Converged Cisco Networks (ONT)
Cisco CCNP 642 901 Optimizing Converged Cisco Networks (ONT) Course Number: 642 901 Length: 5 Day(s) Certification Exam This course will help you prepare for the following exams: Cisco CCNP Exam 642 901:
More informationChapter 10 Link-State Routing Protocols
Chapter 10 Link-State Routing Protocols CCNA2-1 Chapter 10 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor, Ontario. Thanks
More information- IGRP - IGRP v1.22 Aaron Balchunas
1 - GRP - GRP (nterior Gateway Routing Protocol) GRP is a isco-proprietary Distance-Vector protocol, designed to be more scalable than RP, its standardized counterpart. GRP adheres to the following Distance-Vector
More informationICND2 NetFlow. Question 1. What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring. B.
ICND2 NetFlow Question 1 What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring B. Network Planning C. Security Analysis D. Accounting/Billing Answer: A C D NetFlow
More informationIntroduction. Technology background
White paper: Redundant IP-VPN networks Introduction IP VPN solutions based on the IPsec protocol are already available since a number of years. The main driver for these kinds of solutions is of course
More informationWhitepaper. A Guide to Ensuring Perfect VoIP Calls. www.sevone.com blog.sevone.com info@sevone.com
A Guide to Ensuring Perfect VoIP Calls VoIP service must equal that of landlines in order to be acceptable to both hosts and consumers. The variables that affect VoIP service are numerous and include:
More informationLoad balancing and traffic control in BGP
DD2491 p2 2009/2010 Load balancing and traffic control in BGP Olof Hagsand KTH /CSC 1 Issues in load balancing Load balancing: spread traffic on several paths instead of a single. Why? Use resources better
More informationCisco Prime Network Analysis Module Software 5.1 for WAAS VB
Cisco Prime Network Analysis Module Software 5.1 for WAAS VB Network administrators need multifaceted visibility into the network and application to help ensure consistent and cost-effective delivery of
More informationTroubleshooting and Maintaining Cisco IP Networks Volume 1
Troubleshooting and Maintaining Cisco IP Networks Volume 1 Course Introduction Learner Skills and Knowledge Course Goal and E Learning Goal and Course Flow Additional Cisco Glossary of Terms Your Training
More informationALCATEL-LUCENT VITALSUITE Application & Network Performance Management Software
ALCATEL-LUCENT VITALSUITE Application & Network Performance Management Software MONITOR, MEASURE AND ENHANCE DELIVERY OF MISSION CRITICAL BUSINESS SERVICES ACROSS A MULTIVENDOR, MULTI-SERVICE INFRASTRUCTURE
More informationMPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans
MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans Contents Overview 1 1. L2 VPN Padding Verification Test 1 1.1 Objective 1 1.2 Setup 1 1.3 Input Parameters 2 1.4 Methodology 2 1.5
More informationEmbracing Microsoft Vista for Enhanced Network Security
Embracing Microsoft Vista for Enhanced Network Security Effective Implementation of Server & Domain Isolation Requires Complete Network Visibility throughout the OS Migration Process For questions on this
More informationThe Software Defined Hybrid Packet Optical Datacenter Network SDN AT LIGHT SPEED TM. 2012-13 CALIENT Technologies www.calient.
The Software Defined Hybrid Packet Optical Datacenter Network SDN AT LIGHT SPEED TM 2012-13 CALIENT Technologies www.calient.net 1 INTRODUCTION In datacenter networks, video, mobile data, and big data
More informationUsing OSPF in an MPLS VPN Environment
Using OSPF in an MPLS VPN Environment Overview This module introduces the interaction between multi-protocol Border Gateway Protocol (MP-BGP) running between Provider Edge routers (s) and Open Shortest
More informationTroubleshooting Common Issues in VoIP
Troubleshooting Common Issues in VoIP 2014, SolarWinds Worldwide, LLC. All rights reserved. Voice over Internet Protocol (VoIP) Introduction Voice over IP, or VoIP, refers to the delivery of voice and
More informationEVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE
EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE EXECUTIVE SUMMARY Enterprise network managers are being forced to do more with less. Their networks are growing in size and complexity. They need
More informationFast Re-Route in IP/MPLS networks using Ericsson s IP Operating System
Fast Re-Route in IP/MPLS networks using s IP Operating System Introduction: Today, Internet routers employ several routing protocols to exchange routes. As a router learns its potential routes, it builds
More informationHow Route Analytics Enables Virtualization and Cloud Computing
How Route Analytics Enables Virtualization and Cloud Computing By Jim Metzler, Ashton Metzler & Associates Distinguished Research Fellow and Co-Founder, Webtorials Editorial/Analyst Division Introduction
More informationTroubleshooting Bundles and Load Balancing
CHAPTER 5 This chapter explains the procedures for troubleshooting link bundles and load balancing on the Cisco ASR 9000 Aggregation Services Router. A link bundle is a group of ports that are bundled
More informationEnterprise Energy Management with JouleX and Cisco EnergyWise
Enterprise Energy Management with JouleX and Cisco EnergyWise Introduction Corporate sustainability and enterprise energy management are pressing initiatives for organizations dealing with rising energy
More informationLab 4.5.4 Diagramming External Traffic Flows
Lab 4.5.4 Diagramming External Traffic Flows Device Designation Device Name Address Subnet Mask Discovery Server Business Services 172.17.1.1 255.255.0.0 R1 R2 R3 FC-CPE-1 FC-CPE-2 ISP Fa0/1 172.17.0.1
More informationTowards a Next- Generation Inter-domain Routing Protocol. L. Subramanian, M. Caesar, C.T. Ee, M. Handley, Z. Mao, S. Shenker, and I.
Towards a Next- Generation Inter-domain Routing Protocol L. Subramanian, M. Caesar, C.T. Ee, M. Handley, Z. Mao, S. Shenker, and I. Stoica Routing 1999 Internet Map Coloured by ISP Source: Bill Cheswick,
More informationJuniper Networks NorthStar Controller
Juniper Networks NorthStar Controller Functionality Test Report Introduction IP/MPLS has been the technology of choice for service providers for the better part of a decade and a half. Backbone network
More informationCISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY
CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY CISCO INFORMATION TECHNOLOGY SEPTEMBER 2004 1 Overview Challenge To troubleshoot capacity and quality problems and to understand
More informationDistance Vector Routing Protocols. Routing Protocols and Concepts Ola Lundh
Distance Vector Routing Protocols Routing Protocols and Concepts Ola Lundh Objectives The characteristics of distance vector routing protocols. The network discovery process of distance vector routing
More information